The immense cyberattack, information systemscompromise globally and especially in my company has drawn me towards havingkeen interest in this field. I find system security activities very interestingespecially patch managements, applying fixes and updates on operating systemsamong others. As a system administrator with several years of experience,securing systems and data have challenged me to delve deeper on effectivesecurity implementation methodologies. Therefore, I would like to pursue adegree course in information systems security in Concordia University since itcontains courses among others in operating systems security which is very interestingto me.Duringmy undergraduate studies at Ekiti state university (formerly University of Ado-Ekiti),with keen interest in the computer architecture anddigital communications, I emerged the best student in the courses scoring 89%and 87% respectively. The interest in communications spurred me into acquiringknowledge in networks and data communications and certifications programs.
Theknowledge acquired has helped me to appreciate how computer systems andnetworks are applied to our day-to-day practical life. After graduation, pursuing a career in informationtechnology was not a difficult option as the fundamentals were understood by meand I was equally amongst the best 3 candidate who were given the opportunityto choose their preferred department in my present place of work during therecruitment stages. I started as a desktop support analyst where computersystems are setup, configured and deployed for use after ensuring the systemsare secured by installing antivirus, disabling all unnecessary services andinstalling only needed applications amongst others. Because of mymeticulousness and stint for system management after 3 years, I was seconded towork closely with the Enterprise system administrators where I learnt differentOperating Systems managements and storage infrastructure etc. This earned me aslot for an international training in South Africa as the first entry levelstaff to be considered. This feat I have kept and had sustained me to risethrough the rank and file.
In the last seven years, I have tediously workedclosely with security experts in the implementation of security processes andsystems, one of such is the implementation and certification process of Payment CardIndustry Data Security Standard(PCI DSS) on major card schemesand ISO-27001 in my place of work. I have implemented various systems and usersecurity settings on UNIX and windows operating systems. I believe these arejust subset of what information systems security entails.
I want to acquiremore in-depth theoretical understanding to further hone my idea of practicalapproaches and skills to allow me develop expertise in information systemssecurity which I believe is more ideal in the University settings rather thanrelying on personal development and intuition. Thank you for your time andconsideration. High Regards,